Search Results

Showing 721-730 from 854

Tasks Logs (in Comodo Internet Security)

...run and so on. The  'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time when the task is launched. Type - Indicates the type of the task. Parameter - Indicates the parameter (like scan type) associated with the task. Completed - Contains precise details of the date and time of the completion of the task. Code - Indicates the code...

http://help.comodo.com/topic-72-1-623-7700--Tasks-Logs.html
Source Network Address Translation (in Comodo Dome Firewall)

...running a web or mail service and the outgoing packets should contain the external IP address of the server. Tip : CDome Firewall also allows you to create Destination NAT (DNAT) rules for incoming traffic. DNAT rules redirect service-specific traffic from a port on a host or interface to another host/port combination. See Configure Virtual IP for Destination Network Address Translation for more details. SNAT rules can be created and managed from the 'SNAT' interface. Click 'Firewall' > 'SNAT' in the left menu to open the SNAT interface The interface displays all current SNAT rules in effect and allows...

http://help.comodo.com/topic-451-1-936-12794-Source-Network-Address-Translation.html
Configure Program And Virus Database Updates (in Comodo Internet Security)

...running from battery power. This is intended to extend battery lifetime on laptops. ( Default = Enabled ) Proxy and Host Settings – Allows you to select the host from which updates are downloaded. By default, CIS will directly download updates from Comodo servers. However, advanced users and network admins may wish to first download updates to a proxy/staging server and have individual CIS installations collect the updates from there. The 'Proxy and Host Settings' interface allows you to point CIS at this proxy/staging server. This helps conserve overall bandwidth consumption and accelerates the update process when large number of endpoints are involved...

http://help.comodo.com/topic-72-1-522-6293-Configure-Program-and-Virus-Database-Updates.html
Backup Settings (in Xcitium SIEM)

...button at the bottom. Backup service is not active message is shown in the backup and overview pages if you disable backup here. This message is also shown if you have a backup license but the file and database backup settings are not configured. Schedule your Backup This section lets you configure regular, automatic, backups of your site. Scheduled backups are full backups that replace the previous one, whereas on-demand backups are incremental backups. Select the target website from the menu at top-left Click the 'Backup' tab Click 'Settings' Locate the 'Schedule' pane: Backup Frequency - Four options...

http://help.comodo.com/topic-285-1-848-12466-Backup-Settings.html
Tasks (in Comodo Antivirus for Servers)

...run and so on. The 'Tasks Launched' log window displays a list of tasks launched at various time points with their completion status and other details. The 'Tasks' logs can be viewed by selecting 'Tasks' from the 'Show' drop-down of the log viewer interface. Column Descriptions Date - Contains precise details of the date and time when the task is launched. Type - Indicates the type of the task. Parameter - Indicates the parameter (like scan type) associated with the task. Completed - Contains precise details of the date and time of the completion of the task. Code - Indicates the code...

http://help.comodo.com/topic-213-1-517-5995-Tasks.html
Managing Quarantined Items (in Comodo Rescue Disk)

...run or executed. This isolation prevents infected files from affecting the rest of your PC. If a file cannot be disinfected, then it provides a reliable safe-house until the virus database is updated- neutralizing the impact of any new virus. All the files cleaned using CCE are moved into Quarantine. You can later analyze these files and take the following measures: If the file could not be identified by you as safe, you can remove it from your system; If the file is safe and came from a trustworthy source, you can restore it to the original location...

http://help.comodo.com/topic-170-1-493-5222-Managing-Quarantined-Items.html
Search Events By File (in Xcitium Enterprise)

...button Set your preferred rating from the options: The new rating will be propagated to all endpoints during the next synchronization. File Trajectory The 'File Trajectory' tile shows the movement of the file on the endpoints and actions executed on them.. You can also view the process creation events, alerts generated and detection events involving the file on the endpoint. The timeline graph shows the history of the file, with details like how it was downloaded / copied to the device and actions of XCS security components on the device. The legend of the icons used in the graph...

http://help.comodo.com/topic-463-1-1029-15755-Search-Events-by-File.html
Protected Files And Folders (in Endpoint Manager)

...running in the container. This fortifies files containing sensitive data from unrecognized and potentially malicious programs. Protected Files and Protected Data Items in ' Protected Files ' ('Settings' > 'HIPS' > 'Protected Objects' > 'Protected Files') can be read by any program, but not modified by them. This contrasts to items in 'Protected Data', which are totally hidden to contained programs.  If you want a file/folder to be read by other programs, but protected from modification, then add it to 'Protected Files' list. If you want to totally conceal an item from contained programs, but allow read/write access to trusted programs...

http://help.comodo.com/topic-399-1-904-11884-Protected-Files-and-Folders.html
Vulnerability Report (in Comodo Web Inspector)

...button beside the IP/Domain name from the 'Device List' area to view the report. An example of the Vulnerability Report is given below. The Vulnerability Report consists of a summary of the scan details and the prioritized list of the vulnerabilities found. Scan Summary The scan summary contains the following details: Company Name - The Company name of the subscriber. ASV company name - Name of the approved scanning vendor (Comodo CA Ltd.,). Scan expiration date - The expiry date of the scan for which the report was generated. Start Time - The date and time at which the scan was started. Finish Time...

http://help.comodo.com/topic-208-1-490-5185-Vulnerability-Report.html
Protected Files And Folders (in Advanced Endpoint Protection)

...running in the container. This fortifies files containing sensitive data from unrecognized and potentially malicious programs. Protected Files and Protected Data Items in ' Protected Files ' ('Settings' > 'HIPS' > 'Protected Objects' > 'Protected Files') can be read by any program, but not modified by them. This contrasts to items in 'Protected Data', which are totally hidden to contained programs.  If you want a file/folder to be read by other programs, but protected from modification, then add it to 'Protected Files' list. If you want to totally conceal an item from contained programs, but allow read/write access to trusted programs...

http://help.comodo.com/topic-467-1-1050-16672-Protected-Files-and-Folders.html
Pages 73 of 86 « Prev     Next »   Jump to page